Issue OverviewCWEurope - December 2012
Many benefits come attached to virtualisation, however with it spreading into a variety of technology areas it is important that IT professionals keep up with the skills and expertise that is required of them to ensure their business remains safe and efficient. CW Europe looks at how European businesses are utilising the technology. This month’s digital magazine brings you the leading stories and expert tips from across Europe. Access >>>
Premium Content for Free.
Seeking nirvana: virtualisation without security risk
by Warwick Ashford
With a virtual infrastructure, finding a harmonious balance between cost-saving and safety is a vital task
- Seeking nirvana: virtualisation without security risk by Warwick Ashford
German public sector firm BAG beat data woes with storage virtualisation
by Archana Venkatraman
German Federal Office for Freight Transport - BAG - found a solution to its data management problems in storage virtualisation
Renegotiating outsourcing contracts to fit new reality
by Karl Flinders
Organisations in many sectors seek to renew the terms in their contractual agreements as they adjust to the economic climate
Global taskforce for datacentre energy efficiency pick three new metrics
by Archana Venkatraman
In addition to PUE, datacentre operators have three new metrics – Green Energy Coefficient (GEC), Energy Reuse Factor (ERF) and Carbon Usage Effectiveness (CUE)
Customer understanding drives investment in big data analytics
by Brian McKenna
Better customer understanding is the main motivation for big data programmes, survey finds
Vodafone blames southern Europe as revenues plummet 7.4%
by Jennifer Scott
Vodafone reports revenues down 7.4% year-on-year for the first half of the fiscal year, blaming weak markets in southern Europe for the drop
- German public sector firm BAG beat data woes with storage virtualisation by Archana Venkatraman
More Premium Content Accessible For Free
Open Trusted Technology Provider Standard (O-TTPS)
The O-TTPS is an open standard containing a set of guidelines that when properly adhered to have been shown to enhance the security of the global ...
The identity perimeter
Successful businesses recognise the value of open communications within and beyond their organisations. However, achieving this means that the ...
Enabling the secure use of RFID
UHF radio frequency identification (RFID) promises vastly improved data collection and the analysis of physical objects from consumables to patients....